tag:www.gov.uk,2005:/search/guidance-and-regulationGuidance and regulation2026-04-29T16:08:00+01:00HM Governmenttag:www.gov.uk,2005:/guidance/report-a-vulnerability-on-a-defra-system2026-04-29T16:08:00+01:00Report a vulnerability on a Defra systemHow to report a security vulnerability on a Department for Environment, Food and Rural Affairs (Defra) system.tag:www.gov.uk,2005:/government/publications/cyber-resilience-pledge2026-04-22T09:30:00+01:00Cyber Resilience PledgeOrganisations are invited to take the Cyber Resilience Pledge, which contains 3 actions that will have an immediate positive impact on resilience to cyber attacks.tag:www.gov.uk,2005:/government/publications/industry-security-notices-isns2026-04-14T15:48:51+01:00Industry Security Notice (ISN)A list of Industry Security Notices (ISNs) for defence personnel to highlight security changes or information.tag:www.gov.uk,2005:/government/publications/cyberasap-alumni-on-difficulties-for-foreign-nationals-setting-up-a-business-in-the-uk-survey-privacy-notice2026-04-14T13:34:29+01:00CyberASAP alumni on difficulties for foreign nationals setting up a business in the UK survey: privacy noticeA privacy notice for the survey of Cyber Academic Startup Accelerator programme alumni on difficulties of foreign nationals setting up a business in the UK.tag:www.gov.uk,2005:/government/publications/uk-digital-verification-services-trust-framework-data-schema-1-02026-04-13T16:29:59+01:00UK digital verification services trust framework data schema (1.0)A specification to help DVS and relying parties organise and exchange information in a consistent way to enable interoperabilitytag:www.gov.uk,2005:/guidance/legal-aid-agency-cyber-security-incident2026-03-16T14:54:47+00:00Legal Aid Agency cyber security incidentA dedicated space with the latest updates, contingency measures and processes following a cyber attack on the Legal Aid Agency’s online digital services.tag:www.gov.uk,2005:/government/publications/cyber-essentials-scheme-overview2026-03-13T16:20:49+00:00Cyber Essentials scheme: overviewCyber Essentials is a government-backed, industry-supported scheme to help organisations protect themselves against common online threats.tag:www.gov.uk,2005:/guidance/cyber-security-model-question-sets2026-03-10T12:20:10+00:00Cyber Security Model Question SetsSupplier Assurance Questionnaire (SAQ) and Flow Down Risk Assessment (RA) Question sets.tag:www.gov.uk,2005:/government/publications/uk-digital-verification-services-trust-framework-1-02026-03-06T16:01:32+00:00UK digital verification services trust framework (1.0)A pre-release of the next version of the UK digital verification services trust framework.tag:www.gov.uk,2005:/government/publications/how-to-check-someones-identity-1-02026-03-06T16:00:58+00:00How to check someone's identity (1.0)This guidance, also known as Good Practice Guide (GPG) 45, helps you decide how to check, or ask others to check, the identity of those you interact with.tag:www.gov.uk,2005:/government/publications/how-to-use-authenticators-to-protect-an-online-service-1-02026-03-06T16:00:23+00:00How to use authenticators to protect an online service (1.0)This guidance, also known as Good Practice Guide (GPG) 44, will help you choose an authenticator that will give you the level of protection that’s most suitable for users accessing your service. tag:www.gov.uk,2005:/government/publications/how-to-create-a-vouch-as-evidence-of-someones-identity-1-02026-03-06T15:59:54+00:00How to create a vouch as evidence of someone’s identity (1.0)Guidance on creating, storing and checking evidence of someone’s identity that relies on a ‘vouch’, a formal declaration from a third-party that knows them and is willing to confirm their identity.tag:www.gov.uk,2005:/government/publications/how-to-create-bind-and-share-attributes-1-02026-03-06T15:59:18+00:00How to create, bind and share attributes (1.0)Guidance on creating, binding, scoring and sharing attributes for organisations certified against the UK digital verification services trust framework as an attribute service provider, or interested in understanding more abo…tag:www.gov.uk,2005:/government/publications/how-to-check-whether-someone-has-delegated-authority-1-02026-03-06T15:58:54+00:00How to check whether someone has delegated authority (1.0)Guidance for services certified against the UK digital verification services trust framework who offer delegated authority as part of their service.tag:www.gov.uk,2005:/government/publications/supplementary-code-for-digital-right-to-work-checks-1-02026-03-06T15:57:49+00:00Supplementary code for digital right to work checks (1.0)A pre-release of the next version of the supplementary code for digital right to work checkstag:www.gov.uk,2005:/government/publications/supplementary-code-for-digital-right-to-rent-checks-1-02026-03-06T15:57:14+00:00Supplementary code for digital right to rent checks (1.0)A pre-release of the next version of the supplementary code for digital right to rent checkstag:www.gov.uk,2005:/government/publications/supplementary-code-for-disclosure-and-barring-service-digital-identity-checks-1-02026-03-06T15:56:36+00:00Supplementary code for Disclosure and Barring Service digital identity checks (1.0)A pre-release of the next version of the supplementary code for Disclosure and Barring Service digital identity checkstag:www.gov.uk,2005:/government/publications/launch-of-the-global-coalition-on-telecoms-6g-security-and-resilience-principles2026-03-03T11:39:19+00:00Launch of the Global Coalition on Telecoms 6G Security and Resilience PrinciplesAt Mobile World Congress 2026, the Global Coalition on Telecoms (GCOT) launched security and resilience principles for 6G. tag:www.gov.uk,2005:/government/publications/global-coalition-on-telecoms-security-and-resilience-principles-for-6g2026-03-03T09:30:00+00:00Global Coalition on Telecoms: Security and Resilience Principles for 6GSecurity and Resilience Principles for 6G from the governments of the Global Coalition on Telecoms (GCOT).tag:www.gov.uk,2005:/government/publications/defence-research-security2026-02-23T09:59:39+00:00Defence research securityResearchers should use this guidance to understand the security measures you need to follow and how to apply them when working with defence research.